General

  • Target

    0013252c4e271145559f32ee5b93f3b2b8d00c2bf07a09c7828a2c58b6a6bd30

  • Size

    2.0MB

  • Sample

    240522-z32bxaha79

  • MD5

    ea582d11262b045efc46abec79b0ce48

  • SHA1

    f50e07fd3ff1881d51b82f7d8ed89c7addb54026

  • SHA256

    0013252c4e271145559f32ee5b93f3b2b8d00c2bf07a09c7828a2c58b6a6bd30

  • SHA512

    86399c820ca4865f25ee94fe4862858db5bd5956882872c7d7d387a7719ebe1f6c4c9a87f285438d565092d38900c4b453df9a7f04c61d9c774b88bbb4b8dd08

  • SSDEEP

    49152:7QzHt472DzJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      0013252c4e271145559f32ee5b93f3b2b8d00c2bf07a09c7828a2c58b6a6bd30

    • Size

      2.0MB

    • MD5

      ea582d11262b045efc46abec79b0ce48

    • SHA1

      f50e07fd3ff1881d51b82f7d8ed89c7addb54026

    • SHA256

      0013252c4e271145559f32ee5b93f3b2b8d00c2bf07a09c7828a2c58b6a6bd30

    • SHA512

      86399c820ca4865f25ee94fe4862858db5bd5956882872c7d7d387a7719ebe1f6c4c9a87f285438d565092d38900c4b453df9a7f04c61d9c774b88bbb4b8dd08

    • SSDEEP

      49152:7QzHt472DzJtTF+TxMoxc1TU+j+dAzGwlrh:7QzHtZtIuoITsdZ

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks